|
Message-ID: <20120610142329.GA9101@openwall.com> Date: Sun, 10 Jun 2012 18:23:29 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: JtR to process the LinkedIn hash dump On Wed, Jun 06, 2012 at 04:55:38PM -0500, jfoug wrote: > The linkedin hash dump, was a big release today. However, many the hashes > themselves were modified, by overwriting the first 5 digits with 0's (20 > bits). There is now a patch on the JtR wiki page, which you can patch into > a Jtr 1.7.9-jumbo-5 release. This will add a new format that is a > modification of the raw-sha1 format. > > The patches are found here: > > http://openwall.info/wiki/john/patches Thanks, Jim! FWIW, here's a blog post by Francois Pesce who has experimented with John the Ripper and JimF's "LinkedIn patch", successfully cracking 2 million passwords: https://community.qualys.com/blogs/securitylabs/2012/06/08/lessons-learned-from-cracking-2-million-linkedin-passwords Some others have cracked more passwords, perhaps mostly by using GPUs - @CrackMeIfYouCan reported over 4 million cracked after the first day - yet 2 million is a fine number, and more importantly the blog post details the approach, which I thought some john-users may find useful. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.